DocumentCode
8150
Title
Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
Author
Cilardo, Alessandro ; Mazzocca, Nicola
Author_Institution
Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Napoli, Italy
Volume
8
Issue
5
fYear
2013
fDate
May-13
Firstpage
810
Lastpage
820
Abstract
Cryptanalysis, i.e., the study of methods for breaking cryptographic algorithms, can greatly benefit from hardware acceleration as a key aspect enabling high-performance attacks. This work investigates the new opportunities inherently provided by a particular class of hardware technologies, i.e., reconfigurable hardware devices, addressing the cryptanalysis of the SHA-1 hash function as a case study. We show how hardware reconfiguration enables some unexplored approaches such as algorithm and architecture exploration, as well as on-the-fly system specialization relying on hardware programmability. We also identify some new cryptanalysis methods, including two novel techniques for SHA-1 cryptanalysis called interbit constraints and constraint relaxation. Relying on the proposed approaches, we designed an FPGA-based platform targeting 71- and 75-round versions of SHA-1. Under the same cost budget, the estimated times for a collision achieved by the platform are at least one order of magnitude lower than other solutions based on high-end supercomputing facilities, reaching the highest performance/cost ratio for SHA-1 collision search and providing a striking confirmation of the impact of hardware reconfigurability.
Keywords
Cryptography; Field programmable gate arrays; Reconfigurable logic; Cryptography; field-programmable gate arrays (FPGAs); reconfigurable logic;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2013.2256898
Filename
6494288
Link To Document